GithubHelp home page GithubHelp logo

ahmedskhalil / dns-reset-checker Goto Github PK

View Code? Open in Web Editor NEW

This project forked from the-login/dns-reset-checker

0.0 1.0 0.0 80 KB

Tools to assess the DNS security of web applications

License: MIT License

Dockerfile 0.62% Python 41.99% Shell 1.54% HTML 55.85%

dns-reset-checker's Introduction

DNS Reset Checker

Tools to assess the DNS security of web applications.

Background

DNS security of web applications? What?

The DNS is a central part of many functionalities of a web application. This includes sending e-mails. If a web application wants to send an e-mail, the e-mail domain first needs to be resolved to an IP address. This is done via a DNS name resolution. Easy!
But what happens, if this DNS name resolution is vulnerable?
In this case, an attacker could manipulate the resolution of the e-mail domain. This furthermore means, that e-mails can be redirected to an attacker e-mail server, instead of the actual e-mail server.
This concept is summarized in the following image:
methodology_english_2

An attacker can receive e-mails, so what?

Among newsletters and account notifications there is another functionality that almost always uses e-mails:
The "Forgot password?" feature.
A successful attack on the DNS name resolution of a web application combined with the "Forgot password?" feature can therefore lead to the takeover of user accounts.
This attack vector is not new and has already been discussed back in 2008 when Dan Kaminsky "broke" the DNS. However, as recently discovered in my diploma thesis, some web applications still have a vulnerable DNS name resolution.
Now, to check for vulnerabilities in the DNS name resolution of a web application, the DNS Reset Checker comes into play.

A more in-depth look at the DNS security of web applications and the inner workings of the DNS Reset Checker can be found here.

Requirements and Installation

For a complete setup of the DNS Reset Checker the following components are required:

  • A server (e.g. AWS EC2)
  • A domain (you must be able to set your server as authoritative name server of this domain)
  • docker
  • docker-compose
  • A browser

The installation requires the following steps to be done:

  1. Set the server as the authoritative DNS server of your domain (use "ns1" and "ns2" as name server names)
  2. Make sure your firewall settings allow DNS traffic to reach the server
  3. On the server: git clone https://github.com/The-Login/DNS-Reset-Checker
  4. On the server: sudo ./start.sh [your domain] [server ip address] (e.g. sudo ./start.sh analysis.example 203.0.113.37)

With these steps done, the analysis server should be running on your server and receive DNS queries for the specified domain.
To confirm this the following command can be used: dig 9999999999.[your domain]
This should return the IP address of the server.

Usage

Server's running, now what?

With a working analysis server, the below testing procedure can be followed:

  1. Register on a web application with an e-mail address of the following format: test@VVAAIIIIII.[your domain] (e.g. [email protected])
    • V: Decimal number for versioning
    • A: Decimal number for the attack requirement to test
    • I: Decimal number for the unique identifier of the web application (one identifier per web app)
  2. On the server use sudo ./logs.sh to see which attack requirements were already tested
  3. If a specific attack requirement is missing, register another user and specify the attack requirement to test (e.g. test@0102000001.analysis.example). Goto step 2
  4. Download the file data/dns_log.txt
  5. Fire up the log_analyzer.html in a browser and select the dns_log.txt file to start analyzing.

This process is summarized in the image below: Blog Post (2)

What is actually happening? Why do I have to register? What's the server for?

Let's go to through the testing procedure again:
As already described, the whole process starts with a registration. In this case, your special e-mail address (e.g. [email protected]) is used to register on the web application with identifier "000001". This is done because web applications often send registration e-mails to new users. The web application sending an e-mail initiates a DNS name resolution to your authoritative name server (analysis server), since you entered your analysis domain as e-mail domain. This DNS name resolution can now be analyzed and actively used to test one or more DNS attack requirements. This is done via a DNS proxy (dns_proxy.py). The DNS proxy proxies DNS requests to and from the ADNS and can therefore perform the described actions.
The server's purpose is therefore, as described, to act as an authoritative analysis server.

How do I know if a web application is vulnerable?

As just mentioned, the analysis server tests for attack requirements. These are requirements for DNS attacks.
If all requirements for a DNS attack are fulfilled, the attack should be practically possible.
Currently, the DNS Reset Checker can be used to test for 2 DNS attacks:

  • Kaminsky attacks
  • IP fragmentation attacks

What exactly are their attack requirements, one might ask. Here's a summary of some main requirements:

  • Kaminsky attacks:
    1. Low/No random distribution of source ports
    2. No usage/enforcement of DNS security features (DNS SEC, DNS cookies, 0x20 encoding, etc.)
  • IP fragmentation attacks:
    1. The DNS resolver of the web application accepts IP fragmented DNS responses
    2. No usage/enforcement of DNS security features (DNS SEC, etc.)
    3. Maximum EDNS buffer size larger than 1232

For example, if the DNS name resolution of a web application is vulnerable to Kaminsky attacks, you might see the following scatter plot via the log analyzer:
0000000154_example_IP

The other requirements mentioned can be checked by reading the "General Info" section of the log analyzer output or by analyzing the dns_log.txt log entries directly. general_info

As already mentioned, for a more in-depth look at this topic check out this blog post.

dns-reset-checker's People

Contributors

arponsarker avatar the-login avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.